|
gptkbp:instanceOf
|
gptkb:Access_Control_System
|
|
gptkbp:appliesTo
|
information security
access control systems
|
|
gptkbp:category
|
gptkb:computer_security_standard
access control
role-based access control
|
|
gptkbp:defines
|
constrained RBAC model
core RBAC model
hierarchical RBAC model
symmetrical RBAC model
|
|
gptkbp:fullName
|
NIST Standard for Role-Based Access Control
|
|
gptkbp:hasComponent
|
roles
users
permissions
sessions
|
|
gptkbp:hasConcept
|
role-based access control
|
|
gptkbp:hasFeature
|
separation of duties
role constraints
role hierarchies
permission assignment
user assignment
|
|
gptkbp:influenced
|
enterprise access control policies
software authorization frameworks
|
|
gptkbp:publicationYear
|
2004
|
|
gptkbp:publishedBy
|
gptkb:National_Institute_of_Standards_and_Technology
|
|
gptkbp:publishedIn
|
gptkb:NIST_Special_Publication_800-53
gptkb:NIST_Special_Publication_800-162
|
|
gptkbp:standardNumber
|
NIST INCITS 359-2004
|
|
gptkbp:bfsParent
|
gptkb:Role-based_access_control_(RBAC)
gptkb:core_RBAC
|
|
gptkbp:bfsLayer
|
8
|
|
https://www.w3.org/2000/01/rdf-schema#label
|
NIST RBAC standard
|